ABSTRACT
A technique to generate non-invertible and revocable iris templates is proposed employing key-dependent wavelet transforms. In particular, parametrised wavelet-filters and wavelet packets are used in feature extraction in replacement of a pyramidal D4 wavelet transform. Since the template generation process is non-invertible by design, the overall scheme is non-invertible as well. Recognition accuracy is found to be high as long as personal tokens remain secret, templates can be revoked by simply exchanging the wavelet transform applied in the feature extraction process.
- R. Cappelli, A. Lumini, D. Maio, and D. Maltoni. Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9):1489--1503, 2007. Google ScholarDigital Library
- A. Cohen and N. Dyn. Nonstationary subdivisions schemes and multiresolution analysis. SIAM Journal of Mathematical Analysis, 27(6):1745--1769, Nov. 1996. Google ScholarDigital Library
- W. Dietl, P. Meerwald, and A. Uhl. Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies), 83(10):2095--2116, Oct. 2003 Google ScholarDigital Library
- D. Engel, T. Stütz, and A. Uhl. Assessing JPEG2000 encryption with key-dependent wavelet packets. EURASIP Journal on Information Security, 2012(2), 2012.Google Scholar
- Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In I. Goldberg and M. Atallah, editors, Proceedings of Privacy Enhancing Technologies (PETS'09), volume 5672 of LNCS, pages 235--253. Springer Verlag, 2009. Google ScholarDigital Library
- J. Feng and A. Jain. Fingerprint reconstruction: From minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(2):209,223, 2011. Google ScholarDigital Library
- J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia. From the iriscode to the iris: A new vulnerability of iris recognition systems, 2012. Briefings-Talk at blackhat USA 2012, http://media.blackhat.com/bh-us-12/Briefings/Galbally/BH_US_12_Galbally_Iris_Reconstruction_WP.pdf.Google Scholar
- O. Gerek and A. Cetin. Polyphase adaptive filter banks for fingerprint image compression. Electronics Letters, 34:1931?--1932, Oct. 1998.Google ScholarCross Ref
- M. Gomez-Barrero, J. Galbally, P. Tome, and J. Fierrez. On the vulnerability of iris-based systems to a software attack based on a genetic algorithm. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, volume 7441 of Lecture Notes on Computer Science, pages 114--121, Berlin, Heidelberg, 2012. Springer-Verlag.Google Scholar
- M. Häfner, R. Kwitt, A. Uhl, A. Gangl, F. Wrba, and A. Vécsei. Computer-assisted pit-pattern classification in different wavelet domains for supporting dignity assessment of colonic polyps. Pattern Recognition, 42(6):1180--1191, Sept. 2008. Google ScholarDigital Library
- J. Hämmerle-Uhl, E. Pschernig, and A. Uhl. Cancelable iris-templates using key-dependent wavelet transforms. In Proceedings of the 6th IAPR/IEEE International Conference on Biometrics (ICB'13), Madrid, Spain, June 2013. To appear.Google ScholarCross Ref
- A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP Journal Adv. Signal Process, 2008:1--17, 2008. Google ScholarDigital Library
- G. Laimer and A. Uhl. Key dependent JPEG2000-based robust hashing for secure image authentication. EURASIP Journal on Information Security, Article ID 895174:doi:10.1155/2008/895174, 19 pages, 2008. Google ScholarDigital Library
- L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Transactions on Image Processing, 13(6):739--750, June 2004. Google ScholarDigital Library
- B. Mühlbacher, T. Stütz, and A. Uhl. JPEG2000 Part 2 wavelet packet subband structures in fingerprint recognition. In P. Frossard, H. Li, F. Wu, B. Girod, S. Li, and G. Wei, editors, Visual Communications and Image Processing 2010 (VCIP'10), number 7744 in Proceedings of SPIE, pages 77442C'1--77442C'10, Huang Shan, China, July 2010. SPIE.Google Scholar
- N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614--634, Apr. 2001. Google ScholarDigital Library
- C. Rathgeb and A. Uhl. Attacking iris recognition: An effcient hill-climbing technique. In Proceedings of the 20th International Conference on Pattern Recognition (ICPR'10), pages 1217--1220, Istanbul, Turkey, 2010. Google ScholarDigital Library
- C. Rathgeb and A. Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011(3), 2011.Google Scholar
- C. Roberts. Biometric attack vectors and defenses. Computers & Security, 26:14--25, 2007.Google ScholarDigital Library
- A. Ross, J. Shah, and A. K. Jain. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):544--560, 2007. Google ScholarDigital Library
- J. Schneid and S. Pittner. On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing, 51:165--173, May 1993.Google ScholarCross Ref
- B. Sy. Secure computation for privacy preserving biometric data retrieval and authentication. In D. Ortiz-Arroyo et al., editors, Intelligence and Security Informatics, volume 5376 of LNCS, pages 143--154. Springer Verlag, 2008. Google ScholarDigital Library
- S. Venugopalan and M. Savvides. How to generate spoofed irises from an iris code template. IEEE Transactions of Information Forensics and Security, 6:385--394, 2011. Google ScholarDigital Library
- M. Wickerhauser. Adapted wavelet analysis from theory to software. A.K. Peters, Wellesley, Mass., 1994. Google ScholarDigital Library
- Y. Zhu, T. Tan, and Y. Wang. Biometric personal identification based on iris patterns. In Proceedings of the 15th International Conference on Pattern Recognition (ICPR'00), volume 2, pages 2801--2804. IEEE Computer Society, 2000.Google Scholar
- H. Zou and A. H. Tewfik. Parametrization of compactly supported orthonormal wavelets. IEEE Transactions on Signal Processing, 41(3):1423--1431, Mar. 1993. Google ScholarDigital Library
Index Terms
- Non-invertible and revocable iris templates using key-dependent wavelet transforms
Recommendations
Biometric template protection using cancelable biometrics and visual cryptography techniques
Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual ...
Cancelable features using log-Gabor filters for biometric authentication
Wide spread use of biometric based authentication requires security of biometric data against identity thefts. Cancelable biometrics is a recent approach to address the concerns regarding privacy of biometric data, public confidence, and acceptance of ...
Iris recognition using multi-resolution transforms
Iris recognition is one of the most reliable personal identification methods and it plays a very important role in forensic and civilian applications. In this paper, an efficient multi-resolution based iris recognition system with high performance and ...
Comments